component · model
Sub-zone Delegation.
The Master Zone delegates authority over each sub-zone — Identity, Email, Feed, Auth, Service — to a set of delegation keys. Each delegation key carries two values evaluated independently: grant and deny.
two thresholds, one rule
Both grant and deny follow the same ≥100 summation rule used for master-zone survivorship. To authorize a grant operation (add or modify a sub-zone entry), the signing delegation keys' grant values must sum to ≥100. To authorize a deny operation (revoke or remove an entry), the signing delegation keys' deny values must sum to ≥100. The two are checked independently — the same set of signatures might satisfy one and not the other.
grant = 50
deny = 100"] K2["Key B (backup device)
grant = 50
deny = 100"] end G[Grant a new identity?
need Σ grant ≥ 100] D[Deny / revoke an identity?
need Σ deny ≥ 100] K1 --> G K2 --> G K1 --> D K2 --> D
why two thresholds
Real-world security policy is asymmetric. The cost of an attacker holding a credential they shouldn't is much higher than the cost of a delay in adding a new one. Splitting grant and deny lets you encode that explicitly:
- Rapid revocation. A single key with
deny=100can unilaterally revoke a compromised identity, an out-of-date service binding, or a leaked credential. No quorum, no waiting. - Deliberate authorization. Adding a new identity or service can require multiple keys to agree. No single key can quietly issue itself new powers.
The protocol-level recommendation is simple: configure higher deny authority than grant authority. It should be easy to lock things down. It should be harder to open them up. Read more on the reasoning →
how sub-zones use delegation
Each delegated zone (Identity, Email, etc.) carries the master's
current_master_hash at the time it was authorized, plus
the keys that the master delegated to. When a verifier walks the
chain — master → authority → zone — it confirms that:
- The authority's
master_zone_hashmatches a real master revision. - The master revision actually delegates to the listed keys for this zone type.
- The zone's signatures meet the grant threshold (for new entries) or the deny threshold (for removals).
constraints
- A single zone type may have multiple delegation keys.
- Delegation keys are referenced by index into the Public Key Map — they are ordinary keys, not a separate key class.
- A key may serve as a master key and a delegation key at once. The roles are independent.
see also
- Identity Zone — the most common delegation target.
- Cryptography & revocation essay — the principle in long form.
- RFC POZ-CORE §8